期刊文献+

一种高效的域间证书路径构建算法 被引量:4

A High Efficiency Certification Path Construction Algorithm of Cross Domain
下载PDF
导出
摘要 针对算法实现复杂、耗时,域间证书路径构建的效率低,基于图论的理论思想提出了一种邻接矩阵构建算法.该算法通过Am和F,F2,…,Ft构建CA间的证书路径,其最大优势在于时间复杂度比证书路径表算法降低了一个数量级,使域间证书路径的构建效率明显提高. Since the realization of algorithms is quite complex and time-consuming, the certification path construction of cross domain has low efficiency. To solve the problem, the adjacency matrix construction algorithm is proposed based on the graph theory. The algorithm constructs two CAs certification path by A^m and F, F2, …, F^t. Compared with certification path table, the best merit of the new algorithm is that its time complexity reduces one order of magnitude, which enhances obviously the efficiency of certification path construction of cross domain.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第5期28-30,共3页 Journal of Beijing University of Posts and Telecommunications
关键词 交叉认证 网状信任模型 证书路径构建 cross-certification mesh trust model certification path construction
  • 相关文献

参考文献10

  • 1Adams C, Lloyd S. Understanding public-key infrastructure: concepts, standards and deployment considerations[M]. [S.l. ] : Macmillan Technical Publishing, 1999.
  • 2谢冬清,冷键.PKI原理与技术[M].北京:清华大学出版社,2004.46—72.
  • 3刘远航.PKI交叉认证技术与交叉证书的实现[c]∥第十八次全国计算机安全学术交流会.北京:[s.n.],2003.
  • 4Eyas A1-Hajery. Trust model in PGP and X. 509 standard PKI[ EB/OL]. 2001 (2004-05-01) [2006-07-30 ]. http://www. sans. org/infosecFAQ/encryption/trust/model.htm.
  • 5刘海龙,张其善,吴今培,原仓周.PKI的互操作与信任模型[J].计算机工程与应用,2003,39(24):97-99. 被引量:12
  • 6Jim Turnbull. Cross-certification and PKI policy networking august [ EB/OL ]. 2000 ( 2005-04-01 ) [ 2006-07-30]. http: //www. entrust, com/resourcecenter /pdf/cross_ certification, pdf.
  • 7王晓峰,王尚平,王育民.公钥基础设施中的证书路径构造方法及验证算法[J].计算机工程与应用,2002,38(12):72-74. 被引量:13
  • 8Lloyd S. Understanding certification path construction[EB/OL]. 2002 (2004-09-09) [ 2006-07-09 ]. http: //www. pkiforum, com.
  • 9Jun Xu, Mukesh Singhal. A. Certificate path generation algorithm for authenticated signaling in ATM networks[J]. The Ohio State University, 1997, 10(2) :98-109.
  • 10Pinkas D, Housley R. Delegated path validation and delegated path discovery protocol requirements[Z]. Internet Draft(Work in progress), 2002.

二级参考文献10

  • 1杨千里 王育民.电子商务技术与应用[M].北京:电子工业出版社,1994..
  • 2W E Burr.Public Key Infrastructure(PKI)Technical Specifications: Part A-Technical Concept of Operations.Working Draft, http ://csrc. nist.gov/pki/twg/baseline/pkicon20b.PDF , 1998.
  • 3John Linn.Tmst Model and Management in Public-Key Infrastructures[R].Technical Report, ftp ://ftp.rsasecurity.com/pub/pdfs/PKIPa-per.pdf, 2000.
  • 4Steven Lloyd.PKI Interoperability Framework.Whiter Paper, http :// www.pkiforum.org/pdfs/PKIInteroperabilityFramework.pdf, 2001.
  • 5Capt James M Hayes.The Problem with Multiple Roots in Web Browsers-Certificate Masquerading[C].In:Enabling Technologies:Infrastructure for Collaborative Enterprises, (WET ICE'98)Proceedings, Seventh IEEE International Workshops on, 1998:306-311.
  • 6Steve Lloyd.CA-CA Interoperability.White Paper,http://www.pkiforum.org/pdfs/ca-ca_interop.pdf, 2001.
  • 7Andrew Young,Nada Kapidzic Cicovic,David Chadwick.Trust Models in ICE-TEL[C].In :Network and Distributed System Security,Proceedings, 1997:122-133.
  • 8Gatekeeper:A strategy for public key technology use in the Government.Australian Office of Government Information Technology,http:// www.govonline.gov.au/publications/GatekeeperStrategy.pdf, 1998.
  • 9Achieving PKI Interoperability.Technical Contribution to the APEC TEL WG,undated,http://www.apectelwg.org/apecdata/telwg/eaTG/ eatf06.html.
  • 10冯登国(译).公开密钥基础设施-概念、标准和实施[M].北京:人民邮电出版社,2001..

共引文献23

同被引文献23

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部